{"title":"Improve Two Remote User Authentication Scheme Using Smart Card","authors":"Chin-Ling Chen, Wei-Chen Tsai, Fang-Yie Leu","doi":"10.1109/BWCCA.2013.71","DOIUrl":null,"url":null,"abstract":"The password authentication of smart card has become popularized in current network environment. In 2011, Chen et al. proposed an enhancement on an improvement on two remote user authentication schemes using smart cards. Their scheme can resist the parallel session attack and impersonation attack. However, there are some loopholes in Chen et al.'s scheme that we find their scheme can not resist the off-line password guessing attack and suffer from the time asynchronous. In this paper, we analyze Chen et al.'s security problem and propose an improvement scheme.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2013.71","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The password authentication of smart card has become popularized in current network environment. In 2011, Chen et al. proposed an enhancement on an improvement on two remote user authentication schemes using smart cards. Their scheme can resist the parallel session attack and impersonation attack. However, there are some loopholes in Chen et al.'s scheme that we find their scheme can not resist the off-line password guessing attack and suffer from the time asynchronous. In this paper, we analyze Chen et al.'s security problem and propose an improvement scheme.